6
0
mirror of https://github.com/ChristianLight/tutor.git synced 2024-09-27 11:49:02 +00:00
tutor/tutor/commands
Régis Behmo 01b58d9d75 feat: run all services as unprivileged containers
With this change, containers are no longer run as "root" but as unprivileged
users. This is necessary in some environments, notably some Kubernetes
clusters.

To make this possible, we need to manually fix bind-mounted volumes in
docker-compose. This is pretty much equivalent to the behaviour in Kubernetes,
where permissions are fixed at runtime if the volume owner is incorrect. Thus,
we have a consistent behaviour between docker-compose and Kubernetes.

We achieve this by bind-mounting some repos inside "*-permissions" services.
These services run as root user on docker-compose and will fix the required
permissions, as per build/permissions/setowner.sh These services simply do not
run on Kubernetes, where we don't rely on bind-mounted volumes. There, we make
use of Kubernete's built-in volume ownership feature.

With this change, we get rid of the "openedx-dev" Docker image, in the sense
that it no longer has its own Dockerfile. Instead, the dev image is now simply
a different target in the multi-layer openedx Docker image. This makes it much
faster to build the openedx-dev image.

Because we declare the APP_USER_ID in the dev/docker-compose.yml file, we need
to pass the user ID from the host there. The only way to achieve that is with a
tutor config variable. The downside of this approach is that the
dev/docker-compose.yml file is no longer portable from one machine to the next.
We consider that this is not such a big issue, as it affects the development
environment only.

We take this opportunity to replace the base image of the "forum" image. There
is now no need to re-install ruby inside the image. The total image size is
only decreased by 10%, but re-building the image is faster.

In order to run the smtp service as non-root, we switch from namshi/smtp to
devture/exim-relay. This change should be backward-compatible.

Note that the nginx container remains privileged. We could switch to
nginxinc/nginx-unprivileged, but it's probably not worth the effort, as we are
considering to get rid of the nginx container altogether.

Close #323.
2021-12-20 21:19:10 +01:00
..
__init__.py Move command modules to dedicated directory 2019-05-29 09:53:54 +02:00
cli.py feat: dynamic app name and version suffix 2021-10-14 12:59:57 +02:00
compose.py feat: make it possible to override jobs in dev 2021-11-01 17:21:43 +01:00
config.py feat: env only mode for config generation 2021-06-22 12:25:29 +02:00
context.py refactor: better runner inheritance architecture 2021-11-01 17:21:43 +01:00
dev.py feat: make it possible to override jobs in dev 2021-11-01 17:21:43 +01:00
images.py feat: run all services as unprivileged containers 2021-12-20 21:19:10 +01:00
k8s.py feat: get rid of the nginx container and services 2021-12-20 21:19:10 +01:00
local.py feat: make it possible to override jobs in dev 2021-11-01 17:21:43 +01:00
plugins.py fix: better logging during plugins disable 2021-06-22 12:28:58 +02:00